CVE-2025-1924
Denial of Service and Code Execution in Yokogawa Vnet/IP Interface
Publication date: 2026-02-13
Last updated on: 2026-03-02
Assigner: YokogawaGroup
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yokogawa | vnet/ip_interface_package | to r1.08.00 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-191 | The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The CVE-2025-1924 vulnerability affects the Vnet/IP Interface Package provided by Yokogawa Electric Corporation, specifically versions R1.07.00 or earlier used in CENTUM VP R6 and R7 systems. It is caused by an out-of-bounds write and integer underflow, which occur when the affected product receives maliciously crafted packets.
This vulnerability can lead to a Denial of Service (DoS) by stopping Vnet/IP communication functions or potentially allow arbitrary program execution, meaning an attacker could disrupt communication or run unauthorized code on the system.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause the Vnet/IP communication functions to stop, resulting in a Denial of Service (DoS) which disrupts normal operations of the affected systems.
Additionally, it may allow an attacker to execute arbitrary programs, potentially compromising system integrity and security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2025-1924 vulnerability, you should apply the fixed version R1.08.00 of the Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
Yokogawa recommends performing a risk assessment based on your individual system environment before applying the patch.
Additionally, you may contact Yokogawa for support in implementing the countermeasures.